IOC Report
z14Novospedidosdecompra_Profil_4903.exe

loading gif

Files

File Path
Type
Category
Malicious
z14Novospedidosdecompra_Profil_4903.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Roaming\mqerms.dat
data
dropped
malicious
C:\Users\user\AppData\Roaming\skabiose\slgtsarvens\prender\Extracollegiate\Chiffonnierer\Rudekonvolutten\z14Novospedidosdecompra_Profil_4903.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Roaming\skabiose\slgtsarvens\prender\Kursusplans.Fje
ASCII text, with very long lines (61111), with no line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_eiylbra4.1bj.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_psk4hbo2.z4a.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\bhv6644.tmp
Extensible storage engine DataBase, version 0x620, checksum 0x6eec0579, page size 32768, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\Local\Temp\wjdznalymjqnxoyrjyc
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\skabiose\slgtsarvens\prender\Batteriforsynede\Trolddomsvirksomhederne\Laboredness.Fid
data
dropped
C:\Users\user\AppData\Roaming\skabiose\slgtsarvens\prender\Extracollegiate\Chiffonnierer\Rudekonvolutten\bouillonterningens.skk
data
dropped
C:\Users\user\AppData\Roaming\skabiose\slgtsarvens\prender\Extracollegiate\Chiffonnierer\Rudekonvolutten\nondeferential.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\skabiose\slgtsarvens\prender\Extracollegiate\Chiffonnierer\Rudekonvolutten\z14Novospedidosdecompra_Profil_4903.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\skabiose\slgtsarvens\prender\Hustle118\Foundering\Ljtnanterne\Unstraightness\Holomorph196.mil
BS image, Version -29696, Quantization -30208, (Decompresses to 153 words)
dropped
C:\Users\user\AppData\Roaming\skabiose\slgtsarvens\prender\Hustle118\Foundering\Ljtnanterne\Unstraightness\Slumretppe.hor
data
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\z14Novospedidosdecompra_Profil_4903.exe
"C:\Users\user\Desktop\z14Novospedidosdecompra_Profil_4903.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"powershell.exe" -windowstyle hidden "$Bromslvs=Get-Content 'C:\Users\user\AppData\Roaming\skabiose\slgtsarvens\prender\Kursusplans.Fje';$Oxyphosphate=$Bromslvs.SubString(61080,3);.$Oxyphosphate($Bromslvs)"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c "set /A 1^^0"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Slettelsers% -windowstyle minimized $ronnels=(Get-ItemProperty -Path 'HKCU:\Forsorgspdagog\').Skeletoverstter;%Slettelsers% ($ronnels)"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wjdznalymjqnxoyrjyc"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wjdznalymjqnxoyrjyc"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\hdqrgswaarisauuvaipksos"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\jfwcglgtwzafkaizktcddtnovi"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\reg.exe
REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Slettelsers% -windowstyle minimized $ronnels=(Get-ItemProperty -Path 'HKCU:\Forsorgspdagog\').Skeletoverstter;%Slettelsers% ($ronnels)"
There are 2 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
learfo55ozj01.duckdns.org
malicious
http://geoplugin.net/json.gp
178.237.33.50
malicious
http://geoplugin.net/json.gpd
unknown
http://nuget.org/NuGet.exe
unknown
http://www.imvu.comr
unknown
http://geoplugin.net/json.gpg
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://geoplugin.net/json.gpi
unknown
https://contoso.com/License
unknown
http://www.imvu.com
unknown
https://contoso.com/Icon
unknown
http://geoplugin.net/json.gpr
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://geoplugin.net/json.gp09
unknown
https://ricohltd.top/PIoDroeALMbPB243.binn
unknown
http://geoplugin.net/json.gpz
unknown
https://github.com/Pester/Pester
unknown
http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
unknown
https://ricohltd.top/
unknown
https://www.google.com
unknown
http://geoplugin.net/
unknown
http://geoplugin.net/json.gpE
unknown
https://aka.ms/pscore6lB
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://www.google.com/accounts/servicelogin
unknown
https://login.yahoo.com/config/login
unknown
https://ricohltd.top/PIoDroeALMbPB243.binB
unknown
http://www.nirsoft.net/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://ricohltd.top/PIoDroeALMbPB243.bin
104.21.60.38
http://www.ebuddy.com
unknown
There are 23 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
learfo55ozj01.duckdns.org
193.222.96.21
malicious
geoplugin.net
178.237.33.50
ricohltd.top
104.21.60.38

IPs

IP
Domain
Country
Malicious
193.222.96.21
learfo55ozj01.duckdns.org
Germany
malicious
104.21.60.38
ricohltd.top
United States
178.237.33.50
geoplugin.net
Netherlands

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shield79\Uninstall\mechanalize\Frederikke66
corticosteroid
HKEY_CURRENT_USER\SOFTWARE\valgresultatet\hellige
tilbagefrslen
HKEY_CURRENT_USER\Forsorgspdagog
Skeletoverstter
HKEY_CURRENT_USER\Environment
Slettelsers
HKEY_CURRENT_USER\SOFTWARE\alpwovnb-G3F5OR
exepath
HKEY_CURRENT_USER\SOFTWARE\alpwovnb-G3F5OR
licence
HKEY_CURRENT_USER\SOFTWARE\alpwovnb-G3F5OR
time
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Startup key

Memdumps

Base Address
Regiontype
Protect
Malicious
9F4C000
direct allocation
page execute and read and write
malicious
971E000
heap
page read and write
malicious
971E000
heap
page read and write
malicious
971F000
heap
page read and write
malicious
971A000
heap
page read and write
malicious
46E1000
heap
page read and write
480000
heap
page read and write
2290000
heap
page read and write
6089000
trusted library allocation
page read and write
72F0000
direct allocation
page read and write
96F8000
heap
page read and write
974000
heap
page read and write
2FE0000
heap
page read and write
975000
heap
page read and write
256B1000
heap
page read and write
974000
heap
page read and write
46F5000
heap
page read and write
256B0000
heap
page read and write
401000
unkown
page execute read
2240000
heap
page read and write
431000
unkown
page read and write
8AA8000
heap
page read and write
30B4000
heap
page read and write
4709000
heap
page read and write
974000
heap
page read and write
3280000
heap
page read and write
7B80000
trusted library allocation
page read and write
25210000
remote allocation
page read and write
2295000
heap
page read and write
2583A000
heap
page read and write
7BC000
stack
page read and write
4B3E000
stack
page read and write
470D000
heap
page read and write
32A0000
heap
page read and write
30B4000
heap
page read and write
975000
heap
page read and write
975000
heap
page read and write
25A69000
heap
page read and write
975000
heap
page read and write
259C1000
heap
page read and write
4709000
heap
page read and write
2F19000
heap
page read and write
259C1000
heap
page read and write
24F8E000
stack
page read and write
26AD000
stack
page read and write
25610000
direct allocation
page read and write
339F000
stack
page read and write
70DE000
stack
page read and write
2DB6000
heap
page read and write
252EC000
stack
page read and write
2CE0000
heap
page read and write
46E0000
heap
page read and write
4714000
heap
page read and write
400000
system
page execute and read and write
400000
system
page execute and read and write
7A5E000
stack
page read and write
4BD0000
heap
page read and write
5161000
heap
page read and write
2EBC000
heap
page read and write
5DE000
stack
page read and write
219E000
stack
page read and write
7BA0000
trusted library allocation
page read and write
46E8000
heap
page read and write
46FD000
heap
page read and write
477A000
heap
page read and write
5CFC000
remote allocation
page execute and read and write
46F8000
heap
page read and write
30B4000
heap
page read and write
7C9000
heap
page read and write
30B4000
heap
page read and write
7B50000
trusted library allocation
page read and write
2870000
heap
page read and write
250EE000
stack
page read and write
974000
heap
page read and write
7B90000
trusted library allocation
page read and write
30B4000
heap
page read and write
974000
heap
page read and write
977B000
heap
page read and write
4B80000
heap
page readonly
9718000
heap
page read and write
8730000
trusted library allocation
page read and write
B34C000
direct allocation
page execute and read and write
46E1000
heap
page read and write
31F8000
heap
page read and write
7864000
heap
page read and write
46F1000
heap
page read and write
3250000
heap
page read and write
2EDF000
stack
page read and write
2EA0000
heap
page read and write
239F000
stack
page read and write
977B000
heap
page read and write
7948000
heap
page read and write
7BC0000
trusted library allocation
page read and write
4AF9000
trusted library allocation
page read and write
2F10000
heap
page read and write
857000
stack
page read and write
46F1000
heap
page read and write
2BC4000
heap
page read and write
30B0000
heap
page read and write
9781000
heap
page read and write
765E000
stack
page read and write
25A52000
heap
page read and write
477A000
heap
page read and write
97F000
stack
page read and write
4AF0000
trusted library allocation
page read and write
470D000
heap
page read and write
25729000
heap
page read and write
2A10000
heap
page read and write
477A000
heap
page read and write
25DC0000
unclassified section
page execute and read and write
2542E000
stack
page read and write
7290000
direct allocation
page read and write
620F000
trusted library allocation
page read and write
4BC0000
heap
page read and write
2BD0000
heap
page readonly
333E000
stack
page read and write
974000
heap
page read and write
71C0000
heap
page execute and read and write
471C000
heap
page read and write
8C60000
trusted library allocation
page execute and read and write
248A0000
direct allocation
page read and write
408000
unkown
page readonly
401000
unkown
page execute read
24DBD000
stack
page read and write
25080000
direct allocation
page read and write
384F000
stack
page read and write
25A51000
heap
page read and write
4F1E000
stack
page read and write
4F10000
trusted library allocation
page read and write
255FB000
unclassified section
page execute and read and write
35A0000
heap
page read and write
7260000
direct allocation
page read and write
4F10000
trusted library allocation
page read and write
31AD000
heap
page read and write
8C80000
direct allocation
page execute and read and write
4B7E000
stack
page read and write
46EC000
heap
page read and write
4714000
heap
page read and write
4ECF000
stack
page read and write
248E0000
direct allocation
page read and write
46F3000
heap
page read and write
46E1000
heap
page read and write
355B000
heap
page read and write
30B4000
heap
page read and write
7910000
heap
page read and write
32F0000
heap
page read and write
66FC000
remote allocation
page execute and read and write
974000
heap
page read and write
46F6000
heap
page read and write
780000
heap
page read and write
470E000
heap
page read and write
24D30000
heap
page read and write
873000
stack
page read and write
7840000
trusted library allocation
page read and write
711F000
stack
page read and write
3050000
heap
page readonly
2EA0000
heap
page read and write
A60000
heap
page read and write
974000
heap
page read and write
974000
heap
page read and write
3400000
heap
page read and write
9660000
heap
page read and write
5161000
heap
page read and write
25A48000
heap
page read and write
30B4000
heap
page read and write
2BA0000
heap
page read and write
974000
heap
page read and write
400000
unkown
page readonly
971C000
heap
page read and write
2F1D000
heap
page read and write
25E96000
unclassified section
page execute and read and write
8ABB000
heap
page read and write
3286000
heap
page read and write
9766000
heap
page read and write
329F000
heap
page read and write
2532C000
stack
page read and write
46E9000
heap
page read and write
4701000
heap
page read and write
9980000
direct allocation
page read and write
4B02000
heap
page read and write
46E9000
heap
page read and write
7250000
direct allocation
page read and write
869D000
trusted library allocation
page read and write
99A0000
direct allocation
page read and write
974000
heap
page read and write
477A000
heap
page read and write
3550000
heap
page read and write
46F5000
heap
page read and write
4B0A000
trusted library allocation
page execute and read and write
435000
unkown
page read and write
258B2000
heap
page read and write
24FCF000
stack
page read and write
2A60000
heap
page read and write
974000
heap
page read and write
4705000
heap
page read and write
221E000
stack
page read and write
24D1D000
stack
page read and write
305D000
stack
page read and write
4D28000
heap
page read and write
975000
heap
page read and write
374F000
unkown
page read and write
4718000
heap
page read and write
4701000
heap
page read and write
257C1000
heap
page read and write
46FE000
heap
page read and write
2C1E000
stack
page read and write
2B7E000
stack
page read and write
25090000
direct allocation
page read and write
470A000
heap
page read and write
2F1A000
heap
page read and write
7B10000
trusted library allocation
page read and write
2420000
heap
page read and write
30B4000
heap
page read and write
25E9C000
unclassified section
page execute and read and write
477A000
heap
page read and write
2D9C000
stack
page read and write
8714000
trusted library allocation
page read and write
24CA0000
heap
page read and write
975000
heap
page read and write
2556C000
stack
page read and write
974000
heap
page read and write
52FC000
remote allocation
page execute and read and write
974000
heap
page read and write
2DD9000
stack
page read and write
974C000
heap
page read and write
8740000
heap
page read and write
72D0000
direct allocation
page read and write
6209000
trusted library allocation
page read and write
259C0000
heap
page read and write
2A70000
heap
page read and write
970000
heap
page read and write
248D0000
direct allocation
page read and write
503E000
stack
page read and write
459000
system
page execute and read and write
30B4000
heap
page read and write
4B00000
trusted library allocation
page read and write
974000
heap
page read and write
977B000
heap
page read and write
89A0000
trusted library allocation
page read and write
5061000
trusted library allocation
page read and write
30B4000
heap
page read and write
8C70000
heap
page read and write
50BF000
trusted library allocation
page read and write
258B2000
heap
page read and write
9990000
direct allocation
page read and write
46F0000
heap
page read and write
31F0000
heap
page read and write
3850000
heap
page read and write
2EC0000
heap
page read and write
471C000
heap
page read and write
25729000
heap
page read and write
8C40000
trusted library allocation
page read and write
5050000
heap
page read and write
83C000
stack
page read and write
74A0000
heap
page read and write
473E000
heap
page read and write
470E000
heap
page read and write
46E1000
heap
page read and write
974000
heap
page read and write
34FE000
stack
page read and write
99C0000
heap
page read and write
7AFC000
remote allocation
page execute and read and write
454000
unkown
page readonly
4701000
heap
page read and write
408000
unkown
page readonly
251BD000
stack
page read and write
85D0000
trusted library allocation
page read and write
2BC1000
heap
page read and write
7742000
heap
page read and write
7F070000
trusted library allocation
page execute and read and write
30B4000
heap
page read and write
7868000
heap
page read and write
86F000
stack
page read and write
975000
heap
page read and write
46F2000
heap
page read and write
788000
heap
page read and write
3DA0000
remote allocation
page execute and read and write
9780000
heap
page read and write
2517D000
stack
page read and write
975000
heap
page read and write
2583A000
heap
page read and write
4701000
heap
page read and write
9776000
heap
page read and write
974000
heap
page read and write
2B40000
trusted library allocation
page read and write
2572A000
heap
page read and write
2F1B000
heap
page read and write
46E9000
heap
page read and write
4F40000
trusted library allocation
page execute and read and write
3279000
heap
page read and write
2D0C000
stack
page read and write
974000
heap
page read and write
4AED000
trusted library allocation
page execute and read and write
C74C000
direct allocation
page execute and read and write
974000
heap
page read and write
8A40000
heap
page read and write
863D000
stack
page read and write
4FEE000
stack
page read and write
3870000
heap
page read and write
253EB000
stack
page read and write
974C000
heap
page read and write
2250000
heap
page read and write
70FC000
remote allocation
page execute and read and write
25A69000
heap
page read and write
6061000
trusted library allocation
page read and write
2D9E000
unkown
page read and write
96BC000
heap
page read and write
4B7E000
stack
page read and write
72B0000
direct allocation
page read and write
E54C000
direct allocation
page execute and read and write
9728000
heap
page read and write
41B000
system
page execute and read and write
974000
heap
page read and write
977B000
heap
page read and write
88CC000
stack
page read and write
30B4000
heap
page read and write
254AE000
stack
page read and write
30B0000
heap
page read and write
2EA8000
heap
page read and write
974000
heap
page read and write
43F000
unkown
page read and write
7220000
direct allocation
page read and write
25A49000
heap
page read and write
954C000
direct allocation
page execute and read and write
867E000
stack
page read and write
7A9E000
stack
page read and write
46F0000
heap
page read and write
253AF000
stack
page read and write
2D9F000
stack
page read and write
2512F000
stack
page read and write
974000
heap
page read and write
2552E000
stack
page read and write
46F3000
heap
page read and write
46E4000
heap
page read and write
470D000
heap
page read and write
4B10000
trusted library allocation
page read and write
98000
stack
page read and write
309D000
stack
page read and write
30B4000
heap
page read and write
974000
heap
page read and write
975000
heap
page read and write
30BC000
heap
page read and write
975000
heap
page read and write
59E000
stack
page read and write
974000
heap
page read and write
5059000
heap
page read and write
9776000
heap
page read and write
248B0000
direct allocation
page read and write
24910000
direct allocation
page read and write
79C0000
trusted library allocation
page read and write
470D000
heap
page read and write
BD4C000
direct allocation
page execute and read and write
93E000
stack
page read and write
46F3000
heap
page read and write
25210000
remote allocation
page read and write
46E0000
heap
page read and write
470D000
heap
page read and write
25070000
direct allocation
page read and write
46F0000
heap
page read and write
46E1000
heap
page read and write
2D47000
stack
page read and write
78C2000
heap
page read and write
974000
heap
page read and write
46EE000
heap
page read and write
86E5000
trusted library allocation
page read and write
715E000
stack
page read and write
974C000
heap
page read and write
470C000
heap
page read and write
2BC2000
heap
page read and write
46E8000
heap
page read and write
8680000
heap
page read and write
31A0000
heap
page read and write
4701000
heap
page read and write
30B4000
heap
page read and write
86A0000
trusted library allocation
page execute and read and write
7BA000
heap
page read and write
3320000
heap
page read and write
46F0000
heap
page read and write
24920000
direct allocation
page read and write
34AE000
unkown
page read and write
25E33000
unclassified section
page execute and read and write
60CA000
trusted library allocation
page read and write
470E000
heap
page read and write
46F0000
heap
page read and write
85B0000
heap
page read and write
46E1000
heap
page read and write
24930000
direct allocation
page read and write
2DB0000
heap
page read and write
473E000
heap
page read and write
A3D000
stack
page read and write
25210000
heap
page read and write
975000
heap
page read and write
974000
heap
page read and write
9766000
heap
page read and write
34B0000
heap
page read and write
8760000
trusted library allocation
page read and write
4701000
heap
page read and write
974C000
heap
page read and write
7980000
trusted library allocation
page read and write
3100000
heap
page read and write
8720000
trusted library allocation
page read and write
99B0000
direct allocation
page read and write
8A5F000
heap
page read and write
4DCF000
stack
page read and write
7B70000
trusted library allocation
page read and write
25ACA000
heap
page read and write
46F5000
heap
page read and write
4701000
heap
page read and write
7847000
trusted library allocation
page read and write
2525E000
stack
page read and write
2DEF000
stack
page read and write
255E0000
unclassified section
page execute and read and write
46FE000
heap
page read and write
46FB000
heap
page read and write
2E9F000
stack
page read and write
974000
heap
page read and write
3408000
heap
page read and write
A45000
heap
page read and write
24940000
direct allocation
page read and write
974C000
heap
page read and write
46F0000
heap
page read and write
46E1000
heap
page read and write
8EFC000
remote allocation
page execute and read and write
2254000
heap
page read and write
2546C000
stack
page read and write
9670000
heap
page read and write
475C000
heap
page read and write
25E1D000
unclassified section
page execute and read and write
3328000
heap
page read and write
5E0000
heap
page read and write
2B8E000
stack
page read and write
7B6000
heap
page read and write
3040000
heap
page read and write
3310000
trusted library section
page read and write
24D7C000
stack
page read and write
788E000
heap
page read and write
475C000
heap
page read and write
2BB5000
heap
page read and write
3EFC000
remote allocation
page execute and read and write
250A0000
direct allocation
page read and write
2BA8000
heap
page read and write
79D0000
trusted library allocation
page read and write
9725000
heap
page read and write
4D1F000
stack
page read and write
974000
heap
page read and write
974000
heap
page read and write
248C0000
direct allocation
page read and write
974000
heap
page read and write
974000
heap
page read and write
974C000
heap
page read and write
A40000
heap
page read and write
974000
heap
page read and write
473000
system
page execute and read and write
456000
system
page execute and read and write
2E9F000
stack
page read and write
451000
unkown
page read and write
974000
heap
page read and write
9780000
heap
page read and write
2DD0000
heap
page read and write
46E1000
heap
page read and write
7C1C000
stack
page read and write
8E0000
heap
page read and write
2A6F000
stack
page read and write
323D000
stack
page read and write
46F3000
heap
page read and write
8A30000
trusted library allocation
page execute and read and write
975000
heap
page read and write
326D000
heap
page read and write
719E000
stack
page read and write
72E0000
direct allocation
page read and write
7BD0000
trusted library allocation
page read and write
7B4000
heap
page read and write
975000
heap
page read and write
25E40000
unclassified section
page execute and read and write
321E000
stack
page read and write
970D000
heap
page read and write
8750000
trusted library allocation
page read and write
9776000
heap
page read and write
4AE0000
trusted library allocation
page read and write
31E0000
trusted library section
page read and write
7B00000
trusted library allocation
page execute and read and write
974000
heap
page read and write
640000
heap
page read and write
940000
heap
page read and write
46E4000
heap
page read and write
792A000
heap
page read and write
85C000
stack
page read and write
51B7000
trusted library allocation
page read and write
46C0000
heap
page read and write
4AE4000
trusted library allocation
page read and write
3390000
heap
page read and write
25A39000
heap
page read and write
257A1000
heap
page read and write
8690000
trusted library allocation
page read and write
27AD000
stack
page read and write
286F000
stack
page read and write
2BA8000
heap
page read and write
975000
heap
page read and write
9698000
heap
page read and write
72C0000
direct allocation
page read and write
46E0000
heap
page read and write
7A1E000
stack
page read and write
4F10000
trusted library allocation
page read and write
975000
heap
page read and write
48FC000
remote allocation
page execute and read and write
25A9B000
heap
page read and write
4F0F000
stack
page read and write
331F000
stack
page read and write
2B3E000
stack
page read and write
30B4000
heap
page read and write
974000
heap
page read and write
D14C000
direct allocation
page execute and read and write
9780000
heap
page read and write
84FC000
remote allocation
page execute and read and write
400000
system
page execute and read and write
2F17000
heap
page read and write
46FE000
heap
page read and write
974000
heap
page read and write
6069000
trusted library allocation
page read and write
254ED000
stack
page read and write
42C000
unkown
page read and write
93F0000
direct allocation
page execute and read and write
4B12000
trusted library allocation
page read and write
7ADD000
stack
page read and write
2536E000
stack
page read and write
25A52000
heap
page read and write
74F000
stack
page read and write
709E000
stack
page read and write
2F1E000
heap
page read and write
7AF0000
trusted library allocation
page read and write
974000
heap
page read and write
7240000
direct allocation
page read and write
974000
heap
page read and write
9728000
heap
page read and write
99C6000
heap
page read and write
2A5E000
unkown
page read and write
7FC000
stack
page read and write
248F0000
direct allocation
page read and write
7B30000
trusted library allocation
page read and write
2529F000
stack
page read and write
2B3E000
stack
page read and write
7B40000
trusted library allocation
page read and write
25210000
remote allocation
page read and write
46E4000
heap
page read and write
45C000
system
page execute and read and write
A94C000
direct allocation
page execute and read and write
25A39000
heap
page read and write
4701000
heap
page read and write
974000
heap
page read and write
8C50000
trusted library allocation
page read and write
4F10000
trusted library allocation
page read and write
4B97000
heap
page read and write
45D000
system
page execute and read and write
974000
heap
page read and write
9960000
heap
page readonly
309E000
stack
page read and write
24890000
direct allocation
page read and write
5160000
heap
page read and write
40A000
unkown
page read and write
974000
heap
page read and write
24880000
direct allocation
page read and write
4B30000
trusted library allocation
page read and write
4BD2000
heap
page read and write
4701000
heap
page read and write
46F3000
heap
page read and write
3500000
heap
page read and write
30B4000
heap
page read and write
7860000
heap
page read and write
4F10000
trusted library allocation
page read and write
2260000
heap
page read and write
977B000
heap
page read and write
7230000
direct allocation
page read and write
30B4000
heap
page read and write
4F28000
trusted library allocation
page read and write
2BA0000
heap
page read and write
477A000
heap
page read and write
255AF000
stack
page read and write
46F8000
heap
page read and write
B877000
trusted library allocation
page read and write
2C20000
heap
page read and write
4F50000
trusted library allocation
page read and write
787A000
heap
page read and write
32DE000
stack
page read and write
7280000
direct allocation
page read and write
24DFE000
stack
page read and write
25626000
direct allocation
page execute and read and write
974000
heap
page read and write
46E9000
heap
page read and write
975000
heap
page read and write
8F0000
heap
page readonly
25A69000
heap
page read and write
4AE3000
trusted library allocation
page execute and read and write
2F1A000
heap
page read and write
7970000
trusted library allocation
page read and write
620000
heap
page read and write
25611000
direct allocation
page execute and read and write
645000
heap
page read and write
40D000
unkown
page read and write
9690000
heap
page read and write
7B60000
trusted library allocation
page read and write
2F1C000
heap
page read and write
85C0000
trusted library allocation
page execute and read and write
7960000
trusted library allocation
page read and write
9970000
direct allocation
page read and write
25E19000
unclassified section
page execute and read and write
9780000
heap
page read and write
322A000
heap
page read and write
4BD1000
heap
page read and write
46F0000
heap
page read and write
335E000
stack
page read and write
24900000
direct allocation
page read and write
61F6000
trusted library allocation
page read and write
40A000
unkown
page write copy
46E9000
heap
page read and write
71C5000
heap
page execute and read and write
347F000
stack
page read and write
4F10000
trusted library allocation
page read and write
470C000
heap
page read and write
975000
heap
page read and write
2592C000
heap
page read and write
974000
heap
page read and write
320E000
stack
page read and write
4BD1000
heap
page read and write
46E0000
heap
page read and write
974000
heap
page read and write
46F1000
heap
page read and write
46E0000
heap
page read and write
9780000
heap
page read and write
4BD1000
heap
page read and write
4AD0000
trusted library allocation
page read and write
46E1000
heap
page read and write
769E000
stack
page read and write
DB4C000
direct allocation
page execute and read and write
2DE0000
heap
page read and write
9776000
heap
page read and write
890C000
stack
page read and write
46F1000
heap
page read and write
7850000
heap
page execute and read and write
555E000
trusted library allocation
page read and write
974000
heap
page read and write
4BBE000
stack
page read and write
7B20000
trusted library allocation
page read and write
4F60000
heap
page execute and read and write
30B3000
heap
page read and write
7BB0000
trusted library allocation
page read and write
400000
unkown
page readonly
19A000
stack
page read and write
974000
heap
page read and write
85A7000
stack
page read and write
257C0000
heap
page read and write
7270000
direct allocation
page read and write
7871000
heap
page read and write
7CF000
heap
page read and write
215E000
stack
page read and write
3288000
heap
page read and write
9766000
heap
page read and write
5560000
trusted library allocation
page read and write
4FAC000
stack
page read and write
974000
heap
page read and write
4F10000
trusted library allocation
page read and write
454000
unkown
page readonly
974000
heap
page read and write
974000
heap
page read and write
3220000
heap
page read and write
788A000
heap
page read and write
4B90000
heap
page read and write
329F000
stack
page read and write
30A0000
heap
page read and write
8710000
trusted library allocation
page read and write
3360000
heap
page read and write
4B15000
trusted library allocation
page execute and read and write
72A0000
direct allocation
page read and write
791A000
heap
page read and write
46ED000
heap
page read and write
There are 664 hidden memdumps, click here to show them.